Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Platystemon
Feb 13, 2012

BREADS

Dex posted:

my car has a warning light telling me to check the engine, so i started parking it by slamming it into walls. idiot hellbox trying to tell me how to live my life, gently caress that noise

If my car forcibly pulled off the road every Tuesday for yet another recall, I’d be livid.

Adbot
ADBOT LOVES YOU

Dex
May 26, 2006

Quintuple x!!!

Would not escrow again.

VERY MISLEADING!
bet you can't wait for self-driving cars then

Bloody Hedgehog
Dec 12, 2003

💥💥🤯💥💥
Gotta nuke something

Platystemon posted:

If my car forcibly pulled off the road every Tuesday for yet another recall, I’d be livid.

We're like ten years away from that, max.

Teddybear
May 16, 2009

Look! A teddybear doll!
It's soooo cute!


Microsoft dusted off the update tools for XP, 8, and Server 2003 for this, which gives you an idea of who is being hit.

Apparently a researcher saw that the code checked a specific lengthy non existent domain name with every infection, so he bought that domain name and accidentally tripped a failsafe pausing further spread. If it finds that domain exists it cancels its attempt to infect the computer.

nerdz
Oct 12, 2004


Complex, statistically improbable things are by their nature more difficult to explain than simple, statistically probable things.
Grimey Drawer

Teddybear posted:

Microsoft dusted off the update tools for XP, 8, and Server 2003 for this, which gives you an idea of who is being hit.

Apparently a researcher saw that the code checked a specific lengthy non existent domain name with every infection, so he bought that domain name and accidentally tripped a failsafe pausing further spread. If it finds that domain exists it cancels its attempt to infect the computer.

Whoa, what a hero.

Platystemon
Feb 13, 2012

BREADS

Teddybear posted:

Apparently a researcher saw that the code checked a specific lengthy non existent domain name with every infection, so he bought that domain name and accidentally tripped a failsafe pausing further spread. If it finds that domain exists it cancels its attempt to infect the computer.

So was that the blackhat’s plan all along?

The first whitehat to dig into the code finds the domain. The purchase of that domain signals that the jig is up.

In short, it’s a canary.

Teddybear
May 16, 2009

Look! A teddybear doll!
It's soooo cute!


Probably if he needed to stop the spread for whatever reason, he would have a way to do so. Someone just found it.

Dex
May 26, 2006

Quintuple x!!!

Would not escrow again.

VERY MISLEADING!
most of those tools are made to order, with the author taking a cut of the proceeds. if your client stops paying up, you turn on the killswitch and gently caress their business

Malachite_Dragon
Mar 31, 2010

Weaving Merry Christmas magic
I suddenly really want to know what the killswitch domain name was.

Dex
May 26, 2006

Quintuple x!!!

Would not escrow again.

VERY MISLEADING!
https://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com , which is probably not what you were hoping for

bunch of other words here https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168 for anyone who cares

Humphreys
Jan 26, 2013

We conceived a way to use my mother as a porn mule


Malachite_Dragon posted:

I suddenly really want to know what the killswitch domain name was.

https://crashoveride.do.not

And in an ideal world the URL would play the one loving good song from the Hackers soundtrack:

https://www.youtube.com/watch?v=bV-hSgL1R74

Humphreys has a new favorite as of 13:46 on May 13, 2017

Anil Dikshit
Apr 11, 2007

Humphreys posted:

https://crashoveride.do.not

And in an ideal world the URL would play the one loving good song from the Hackers soundtrack:

https://www.youtube.com/watch?v=bV-hSgL1R74

YouTube link checks out.

FogHelmut
Dec 18, 2003

Teddybear posted:

Microsoft dusted off the update tools for XP, 8, and Server 2003 for this, which gives you an idea of who is being hit.

About half of the cheap bastards I've worked for?

marshmallow creep
Dec 10, 2008

I've been sitting here for 5 mins trying to think of a joke to make but I just realised the animators of Mass Effect already did it for me

The computer I use for office work on Fridays is still using XP, as is the data entry terminal one step down. They are both the only two computers that can access our internal database. I have no idea when anything was last backed up.

1stGear
Jan 16, 2010

Here's to the new us.

marshmallow creep posted:

The computer I use for office work on Fridays is still using XP, as is the data entry terminal one step down. They are both the only two computers that can access our internal database. I have no idea when anything was last backed up.

If you don't know the answer to that question, its probably "never".

Aerdan
Apr 14, 2012

Not Dennis NEDry
The schadenfreude is on anyone who still takes Bill Maher seriously, cos he legitimately believes the Trump administration's assertion that Comey was fired over Clinton's emails. What a maroon.

Ak Gara
Jul 29, 2005

That's just the way he rolls.
"How an idiot designs a bike race"
https://www.youtube.com/watch?v=PXO_AqzVDB4

Sagebrush
Feb 26, 2012

i have no idea how that race was supposed to go, because it looked like just a giant goddamned mess, but lmao @ the douchebag who eats it hard after trying to bunny-hop over the injured person lying in the road (GOTTA GO FAST!). Beautiful.

it's me, the hippie bicycle commuter who is constantly angry at hobbyist bike racers treating the bike paths like their personal training track

PostNouveau
Sep 3, 2011

VY till I die
Grimey Drawer

:psyduck: Why?

Takes No Damage
Nov 20, 2004

The most merciful thing in the world, I think, is the inability of the human mind to correlate all its contents. We live on a placid island of ignorance in the midst of black seas of infinity, and it was not meant that we should voyage far.


Grimey Drawer

Doesn't look like they had police controlling each intersection on the race path either. Every once in a while a big group will ride through downtown Dallas and I've been stuck behind a green light with 100 cyclists just blowing through the red with no apparent authority or control. I've never done it, but in the dark, lizard-brain recesses of my mind I'm always tempted. "They had red I had green I don't know what happened officer I swear." :twisted:

vvv Running makes you look guilty, this way I'm the innocent victim motorist of inconsiderate bike riders :kiddo:

Takes No Damage has a new favorite as of 19:51 on May 13, 2017

Solice Kirsk
Jun 1, 2004

.

Takes No Damage posted:

Doesn't look like they had police controlling each intersection on the race path either. Every once in a while a big group will ride through downtown Dallas and I've been stuck behind a green light with 100 cyclists just blowing through the red with no apparent authority or control. I've never done it, but in the dark, lizard-brain recesses of my mind I'm always tempted. "They had red I had green I don't know what happened officer I swear." :twisted:

Why would you wait to speak to an officer?

insta
Jan 28, 2009

Sagebrush posted:

i have no idea how that race was supposed to go, because it looked like just a giant goddamned mess, but lmao @ the douchebag who eats it hard after trying to bunny-hop over the injured person lying in the road (GOTTA GO FAST!). Beautiful.

it's me, the hippie bicycle commuter who is constantly angry at hobbyist bike racers treating the bike paths like their personal training track

It looked more like he was clipped in and couldn't stop hard enough. Now, WHY he couldn't stop hard enough is another question...

Also, what the gently caress was the Volt driver doing?

PostNouveau
Sep 3, 2011

VY till I die
Grimey Drawer

insta posted:

It looked more like he was clipped in and couldn't stop hard enough. Now, WHY he couldn't stop hard enough is another question...

Also, what the gently caress was the Volt driver doing?

It's the race's car leading the leaders who went through that stupid loop thing and came back around as the group was going by in the other direction. Someone claiming to be the cyclist who hit the race official posted in the video's comments and said that it nearly ran over his head.

quote:

Hi-
I was there. The video seems confusing, and I'd like to clarify. (I was the rider who hit the official-- you can just see me tumbling in front of the car).

This was the Air-Force Classic in Arlington, VA.
That part of the course was used for two directions of the race, with no barriers separating the two directions.
This part of the course was the beginning of a small, 500m loop, where riders pass this spot and return in the other direction.

You can see the field coming through, setting up for a left turn, to begin the loop.
A breakaway was about 20 seconds in front of the field, and arrived at that junction at the same moment as the tail of the field.
The organization's solution was to put a person in the middle of the road, waving her hands, telling us to keep left. Lap after lap, as the field moved like a snake, the road marshal could be seen running for her life as the tail of the field whipped closer to her.
This last time, however, she didn't run fast enough. In one second, I was gripping to the wheel of the rider in front of me (it was at about 10 laps to go). A second later, the rider in front of me swerved left, and i rode directly into the marshal. She was running. I had no time to react. Bam!
The video picks it up where we're both tumbling.

Now the car--- that was the race's lead moto (you can see the breakaway riders coming through a few seconds later). When he stopped, his front bumper was over my head. That's how close I came to dying that day.

Then after that, the rest of the field came through. The location of the incident is also right where the race re-enters that straightaway, so the riders had little time to react to the car, and to the bodies on the ground.

I hope this clarifies.

PostNouveau has a new favorite as of 21:01 on May 13, 2017

bobjr
Oct 16, 2012

Roose is loose.
🐓🐓🐓✊🪧



Tuxedo Ted
Apr 24, 2007

Teacher's pet in the front row, refusing to vacate his seat.

Say Nothing
Mar 5, 2013

by FactsAreUseless

Zipperelli.
Apr 3, 2011



Nap Ghost
Drunk golfing
https://zippy.gfycat.com/ShamefulWeightyCarp.mp4

trickybiscuits
Jan 13, 2008

yospos
Give this kid a goddamn medal. It doesn't matter which one.

Zaphod42
Sep 13, 2012

If there's anything more important than my ego around, I want it caught and shot now.

Humphreys posted:

https://crashoveride.do.not

And in an ideal world the URL would play the one loving good song from the Hackers soundtrack:

https://www.youtube.com/watch?v=bV-hSgL1R74

You mean you don't do your hacking to the amazing song that is Voodoo People?

https://www.youtube.com/watch?v=vpCTMddpQNs

Platystemon
Feb 13, 2012

BREADS

Teddybear posted:

Microsoft dusted off the update tools for XP, 8, and Server 2003 for this, which gives you an idea of who is being hit.

Apparently a researcher saw that the code checked a specific lengthy non existent domain name with every infection, so he bought that domain name and accidentally tripped a failsafe pausing further spread. If it finds that domain exists it cancels its attempt to infect the computer.

Platystemon posted:

So was that the blackhat’s plan all along?

The first whitehat to dig into the code finds the domain. The purchase of that domain signals that the jig is up.

In short, it’s a canary.

Teddybear posted:

Probably if he needed to stop the spread for whatever reason, he would have a way to do so. Someone just found it.

Dex posted:

most of those tools are made to order, with the author taking a cut of the proceeds. if your client stops paying up, you turn on the killswitch and gently caress their business

Article by the researcher who registered the domain.

quote:

The reason which was suggested is that the domain is a “kill switch” in case something goes wrong, but I now believe it to be a badly thought out anti-analysis.

In certain sandbox environments traffic is intercepted by replying to all URL lookups with an IP address belonging to the sandbox rather than the real IP address the URL points to, a side effect of this is if an unregistered domain is queried it will respond as it it were registered (which should never happen).

I believe they were trying to query an intentionally unregistered domain which would appear registered in certain sandbox environments, then once they see the domain responding, they know they’re in a sandbox the malware exits to prevent further analysis.

Bogatyr
Jul 20, 2009
Crane tips over
https://www.youtube.com/watch?v=sq3wcxFz4yk

Rough Lobster
May 27, 2009

Don't be such a squid, bro

*pretending to be smart enough to understand any of this*

Aha, yes! Of course!

Platystemon
Feb 13, 2012

BREADS

Rough Lobster posted:

*pretending to be smart enough to understand any of this*

Aha, yes! Of course!

In the bowels of the evil machine there is a big red button.

Our heroes say “I wonder what this does” and press it.

It stops the machine. It was supposed to do that—stop the machine so that the heroes couldn’t get a good luck at its inner workings.

But our heroes pressed the button really hard and stopped all the evil machines, not just the one they were poking around inside.

Sagebrush
Feb 26, 2012

Rough Lobster posted:

*pretending to be smart enough to understand any of this*

Aha, yes! Of course!

The researcher is saying that when security researchers study malware, they run it in a virtual environment (emulated computer) where any attempts made by the malware to connect to external hosts (servers) are automatically redirected to a research computer, which pretends to be the host in question. That lets the researcher capture and examine the data that the malware is trying to send. This particular bit of software tries to connect to a gibberish website that shouldn't exist, and if it does manage to connect, it shuts down. The researcher thinks that this is a counter-analysis feature -- the malware knows the website should not exist, so if it does, it might mean the malware is running in a research system that pretends to be whatever the malware wants.

It's clever.

TotalLossBrain
Oct 20, 2010

Hier graben!

Sagebrush posted:

The researcher is saying that when security researchers study malware, they run it in a virtual environment (emulated computer) where any attempts made by the malware to connect to external hosts (servers) are automatically redirected to a research computer, which pretends to be the host in question. That lets the researcher capture and examine the data that the malware is trying to send. This particular bit of software tries to connect to a gibberish website that shouldn't exist, and if it does manage to connect, it shuts down. The researcher thinks that this is a counter-analysis feature -- the malware knows the website should not exist, so if it does, it might mean the malware is running in a research system that pretends to be whatever the malware wants.

It's clever.

I'm not sure it makes sense as an anti-analysis technique, though. It relies on the presence of a complex url in the (unknown?) analysis environment to work.

ante
Apr 9, 2005

SUNSHINE AND RAINBOWS

TotalLossBrain posted:

I'm not sure it makes sense as an anti-analysis technique, though. It relies on the presence of a complex url in the (unknown?) analysis environment to work.

No, the sandbox environment redirects all traffic to something that looks like a working website, so you can also capture what the virus is trying to send

syscall girl
Nov 7, 2009

by FactsAreUseless
Fun Shoe

Sagebrush posted:

The researcher is saying that when security researchers study malware, they run it in a virtual environment (emulated computer) where any attempts made by the malware to connect to external hosts (servers) are automatically redirected to a research computer, which pretends to be the host in question. That lets the researcher capture and examine the data that the malware is trying to send. This particular bit of software tries to connect to a gibberish website that shouldn't exist, and if it does manage to connect, it shuts down. The researcher thinks that this is a counter-analysis feature -- the malware knows the website should not exist, so if it does, it might mean the malware is running in a research system that pretends to be whatever the malware wants.

It's clever.

I can't tell if leaving the test stuff in is stupid and clumsy since you should know not to publish that way?

Or maybe alpha builds are the ultimate in malware?

Or we're reading too much into this and only going to hurt our heads trying to second guess this?

Or heck they got a pretty good read on the stuff that took out those Iranian centrifuges from a variable name that looked Jewish...

Platystemon
Feb 13, 2012

BREADS
Imagine you are a member of La Résistance.

You’re trying to stay hidden from the Secret Police while carrying out your operations.

You figure that if they’re on to you, they’ll start seizing all your mail. Your have this clever idea to regularly send a letter to a non‐existent P.O. box. If that letter doesn’t end up returned to you as undeliverable, you will assume that the Secret Police are holding it.

The flaw in the plan (or rather the one that matters in this analogy) is that all the Resistance cells are using the same fictitious P.O. box number. Someone noticed that there were a lot of letters being sent to the same non‐existent P.O. box. They didn’t know why, but they were curious, so they asked the post office if they could have that box number, at it was granted.

The letters were gibberish and the return addresses were to abandoned houses, so receiving them isn’t important directly.

What is important is that now, simultaneously, all the Resistance cells are freaking out that they’ve been busted. They’ve cut all lines of communication and gone into hiding.

The Secret Police haven’t actually caught most of them, but their paranoia has paralysed them. They’re not longer carrying out subersive activities, which the authorities regard as a victory.

Platystemon has a new favorite as of 06:52 on May 14, 2017

Nuevo
May 23, 2006

:eyepop::shittypop::eyepop::shittypop::eyepop::shittypop::eyepop::shittypop::eyepop::shittypop::eyepop::shittypop::eyepop::shittypop::eyepop::shittypop:
Fun Shoe

syscall girl posted:

I can't tell if leaving the test stuff in is stupid and clumsy since you should know not to publish that way?

Test environment as in, people looking to defeat the malware would run it in a test environment.

The malware was designed to recognize it was in such a test environment, and turn itself off to prevent itself being tested.

Adbot
ADBOT LOVES YOU

Regalingualius
Jan 7, 2012

We gazed into the eyes of madness... And all we found was horny.




Have some Hearthstone schadenfreude.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply